Enterprise identity and access management system

Courion Corporation has announced the release of Courion Enterprise Provisioning Suite version 7.80. Customers deploying this release will benefit from Courion's service-oriented architecture which delivers enterprise-class identity services and an improved user experience. In addition, Courion delivers the foundation for the next generation of identity and access management systems which organisations need to meet the growing demand for continuous access compliance.

Courion's Enterprise Provisioning Suite v7.80 helps enterprises of all sizesâ€”from small-to-medium sized businesses to members of the Fortune 500â€”with identity and access management solutions that break down the barriers between business and IT. The solution's benefits include:.

Organisations are increasingly under pressure from regulators, shareholders, and other corporate stakeholders to implement improved Governance, Risk and Compliance (GRC) strategies. One inevitable consequence is that improved access compliance has become a necessary cornerstone of effective GRC policies and strategies.

"The prevalence of compliance, security and privacy concerns has led to a proliferation of preventive and detective GRC solutions in the enterprise. To date, customers have lacked the ability to unify these disparate solutions, making it difficult to ensure that people, access and activity are consistent with policy," said Kurt Johnson, vice president of corporate development, Courion. "The latest release of the Courion Enterprise Provisioning Suite helps companies address this challenge by enabling them to deliver continuous access compliance consistent with policy more quickly, easily and with greater flexibility."

Courion delivers a foundation for enterprise GRC initiatives by supporting the enterprise access policy lifecycle. The enhanced capabilities of Courion's Enterprise Provisioning Suite v7.80 provide the framework for organizations to better define and apply enterprise access policies; detect activity or access inconsistent with those policies; remediate any misuse or non-compliance with policy; and assure policies are appropriate and have been implemented effectively.